Anatomy of a Cyber Attack (Accounting & Auditing Conference)


CPE Credits



PICPA Member: $29 | Nonmember: $39

 More Information

Course No.

You will have up to 90 days after the date of purchase to complete the course and take the exam.


If you attended the Accounting Auditing Conference on December 7, 2016, this course would be considered a duplicate and cannot be used towards your CPE requirement.

Earn CPE anywhere!

Listen to Ken Pyle cover the following:

  • Trends in data security
  • Insurance risk
  • Cybersecurity risk in internal audits


Ken Pyle
DFDR Consulting LLC

Ken Pyle is a partner and Chief Information Security Officer of DFDR Consulting. He has specialized in Information Security, Computer Forensics, Enterprise Virtualization and Network Engineering. Ken has an extensive background in Network Penetration and Remediation, Compliance and Secure Design. Prior to joining DFDR, he served as a Security and Network Engineer for several Information Technology companies and as the IT Director/Security Engineer of a large accounting firm. Ken has consulted with financial institutions, banks, government defense contractors and other highly secure facilities on issues of Information Security, Computer Forensics and Secure Network Design.

Ken has lectured on Information Security and has published several whitepapers on subjects including public information gathering via Social Networking and Social Engineering. Ken was a featured speaker at the 2014, 2013 & 012 Wolters Kluwer CCH User Conference lecturing on "Information Security and Defending the Enterprise" and "Anatomy of a Cyber Attack". Ken is a regular lecturer and presenter on Information Security and has presented for several accounting associations and professional organizations including Prime Global, RBMA and AGN. Ken is also a subject matter expert for Information Security, appearing in industry publications such as Accounting Today and the New Jersey Law Journal. He was also recognized as a "40 under 40" by South Jersey Business People in 2015.

He holds numerous security and technology certifications from companies such as Guidance Software, EC-Council, Cisco, VMware, CompTIA and AccessData. Ken has published several software vulnerabilities and exploits, and is an active researcher. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design.

March 2017

You May Also Like

Analytics and Big Data for Accountants
Sept. 28 | Cranberry
Discuss major trends in predictive analytics, optimization, correlation of metrics, and big data. Explore new tools to measure program impacts and ROI, visualize data and business processes, and uncover the ...
PICPA Ethics Update for CPAs in Public Practice and A&A Hot Topics
Oct. 8 | Cranberry
Use case studies to examine connections between ethics principles, formal rules, and the profession’s public responsibility. Review AICPA, state CPA societies, and state board ethics standards as they apply to ...
A&A Hot Topics
Oct. 8 | Cranberry
Hear an all-encompassing update on financial reporting risks for small and medium companies. Understand how evolving cybersecurity threats impact financial reporting and learn new ways to detect fraudulent financial reporting. ...